In my last blog, I discussed the rationale for applying privacy and security best practices to enable the benefits of personalized medicine while minimizing risks of breaches and other types of security incidents. One of these best practices involves
↧